Challenge Link: https://tryhackme.com/room/retro
A Kali Linux 2019–1 image was used to perform the task.
The IP address of the remote machine for my session was 10.10.200.145
After kicking off the session you will note that you cannot ping the machine in question.
Running nmap -Pn -sV 10.10.200.145 against the machine returned the following ports open.
We can clearly see a web server and the rdp port (3389) are open for business.
A web server is running on the target. What is the hidden directory which the website lives on?
Let’s fire up dirbuster and give it a wordlist…